SUSE-SU-2024:1676-1: important: Security update for MozillaFirefox
SLE-SECURITY-UPDATES
null at suse.de
Fri May 17 16:30:07 UTC 2024
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2024:1676-1
Rating: important
References:
* bsc#1222535
* bsc#1224056
Cross-References:
* CVE-2024-2609
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3854
* CVE-2024-3857
* CVE-2024-3859
* CVE-2024-3861
* CVE-2024-3863
* CVE-2024-3864
* CVE-2024-4367
* CVE-2024-4767
* CVE-2024-4768
* CVE-2024-4769
* CVE-2024-4770
* CVE-2024-4777
CVSS scores:
* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-4367 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4767 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4768 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4769 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4770 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4777 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
* SUSE Linux Enterprise Software Development Kit 12 SP5
An update that solves 15 vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to version 115.11.0 ESR (bsc#1224056):
* CVE-2024-4367: Arbitrary JavaScript execution in PDF.js
* CVE-2024-4767: IndexedDB files retained in private browsing mode
* CVE-2024-4768: Potential permissions request bypass via clickjacking
* CVE-2024-4769: Cross-origin responses could be distinguished between script
and non-script content-types
* CVE-2024-4770: Use-after-free could occur when printing to PDF
* CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11,
and Thunderbird 115.11
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1676=1
* SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1676=1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2024-1676=1
* SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2024-1676=1
## Package List:
* SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
* MozillaFirefox-translations-common-115.11.0-112.212.1
* MozillaFirefox-debugsource-115.11.0-112.212.1
* MozillaFirefox-115.11.0-112.212.1
* MozillaFirefox-debuginfo-115.11.0-112.212.1
* SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
* MozillaFirefox-devel-115.11.0-112.212.1
* SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-common-115.11.0-112.212.1
* MozillaFirefox-debugsource-115.11.0-112.212.1
* MozillaFirefox-115.11.0-112.212.1
* MozillaFirefox-debuginfo-115.11.0-112.212.1
* SUSE Linux Enterprise Server 12 SP5 (noarch)
* MozillaFirefox-devel-115.11.0-112.212.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* MozillaFirefox-translations-common-115.11.0-112.212.1
* MozillaFirefox-debugsource-115.11.0-112.212.1
* MozillaFirefox-115.11.0-112.212.1
* MozillaFirefox-debuginfo-115.11.0-112.212.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
* MozillaFirefox-devel-115.11.0-112.212.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-debugsource-115.11.0-112.212.1
* MozillaFirefox-debuginfo-115.11.0-112.212.1
* SUSE Linux Enterprise Software Development Kit 12 SP5 (noarch)
* MozillaFirefox-devel-115.11.0-112.212.1
## References:
* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://www.suse.com/security/cve/CVE-2024-4367.html
* https://www.suse.com/security/cve/CVE-2024-4767.html
* https://www.suse.com/security/cve/CVE-2024-4768.html
* https://www.suse.com/security/cve/CVE-2024-4769.html
* https://www.suse.com/security/cve/CVE-2024-4770.html
* https://www.suse.com/security/cve/CVE-2024-4777.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222535
* https://bugzilla.suse.com/show_bug.cgi?id=1224056
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20240517/02c89439/attachment.htm>
More information about the sle-security-updates
mailing list